Recent articles by René Millman

Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security
Review: SecureZip

Review: SecureZip

Just about everyone that uses a computer uses compressed zip files in day-to-day use. However, zipped files are not known for their security,
other than sometimes requiring a password for access files stored within a zip file.

René Millman May 19 2004 12:00AM Security
Review: SecureZip

Review: SecureZip

Just about everyone that uses a computer uses compressed zip files in day-to-day use. However, zipped files are not known for their security,
other than sometimes requiring a password for access files stored within a zip file.

René Millman May 19 2004 12:00AM Security
Review: SpySubtract Pro

Review: SpySubtract Pro

Spyware  is a royal pain but the average user is, most of the time, not aware of the snooping activities of these little programs on their computers. 

René Millman Apr 19 2004 12:00AM Security
Review: Spy Sweeper

Review: Spy Sweeper

More of the general public are becoming aware of spyware. Up until now, very little was known of this awful, creeping plague outside of security circles. 

René Millman Apr 3 2004 12:00AM Security
Review: Spy Sweeper

Review: Spy Sweeper

More of the general public are becoming aware of spyware. Up until now, very little was known of this awful, creeping plague outside of security circles. 

René Millman Apr 3 2004 12:00AM Security
Review: ClipDriveBio

Review: ClipDriveBio

While flash drives are all the rage, they can be pretty insecure; to lose it is quite easy as they are so small. Should sensitive material be placed on one such drive, a thief would find getting information off such a device to be a walk in the park. 

René Millman Mar 19 2004 12:00AM Security
Review: Wireless PC Lock

Review: Wireless PC Lock

If pressing Ctrl+Alt+Del to lock Windows every time the weary computer user leaves their desk proves too much of a strain then this new device from Sitecom could be just the ticket.

The Wireless PC Lock is billed as a convenient aid for protecting personal details and programs when away from the PC or laptop. A receiver is connected via a USB port to the computer while a transmitter is placed upon the person. Should the transmitter and receiver be more than two metres apart then the PC will lock.

René Millman Mar 8 2004 12:00AM Security
Review: WipeDrive

Review: WipeDrive

When old computers reach the end of their useful life within an organisation, many an IT professional immediately has thoughts of charity on their mind and donating an old computer means someone else can use it to gain skills or keep in contact with the outside world.

However, this is not without its problems. No-one in their right mind would donate the CEO's old desktop without deleting important data such as financial records or confidential emails. Reformatting the disk does not erase this data permanently.

René Millman Mar 6 2004 12:00AM Security
Review: Prestige 652H-31

Review: Prestige 652H-31

This type of ADSL router is becoming more popular as branch offices look for all-in-one boxes that provide access to the wire and wireless user. 

René Millman Feb 20 2004 12:00AM Security
Review: BinTec X2300

Review: BinTec X2300

While just about every company has a connection to the internet in one form or another, not everyone has a failover option to go back to dial-up or ISDN. Fewer still have VPN or indeed a proper firewall to ensure the lines of communication are secure.

René Millman Feb 1 2004 12:00AM Security
Review: GlobalAdmin Enterprise Security Suite

Review: GlobalAdmin Enterprise Security Suite

Maintaining the security of an organization's laptops and desktops is never an easy task, with many a sleepless night worrying if all devices that come into contact with the enterprise are secured against theft and compromised data. Managing all this can be an overwhelming task.
GlobalAdmin is a management application that is used in conjunction with GTGI's other products, CryptCard and CompuSec. Our review kit came ready prepared on a Dell Optiplex GX400 PC running Windows 2000. We just had to plug in the relevant devices for reading smartcards.

René Millman Jan 1 2004 12:00AM Security
Review: X-IP Mobile VPN Appliance

Review: X-IP Mobile VPN Appliance

Many companies are looking to secure their networks from wardriving attacks and the current advice is to put a VPN behind a wireless access point. With this in mind, the following product should be ideal. The aim of the product is to secure access to network infrastructure from wireless clients using the wireless transport layer security (WTLS) protocol, which is a wireless version of SSL.

René Millman Sep 1 2003 12:00AM Security
Review: Trusted Gateway

Review: Trusted Gateway

This product is built upon Sun's very secure Trusted Solaris 8 operating system, which has been used by the U.S. Department of Defense for over 25 years. It is a hardened version of the Solaris operating system platform for deployment of high-security desktops, database servers, firewalls, and communication gateways.

René Millman Sep 1 2003 12:00AM Security
Review: SEA Tsunami

Review: SEA Tsunami

Now in version 3.6, the Tsunami VPN appliance sports a simpler management interface and new tools for managing access rules, as well as the ability to send password expiration warnings to remote users who authenticate against NT domains.

René Millman Sep 1 2003 12:00AM Security
Review: Aventail EX-1500

Review: Aventail EX-1500

Aventail was probably the first company to conceive and market the idea of the clientless SSL VPN. However it has only recently brought out its own hardware appliance that does such a job.

René Millman Sep 1 2003 12:00AM Security
Review: AppGate Server

Review: AppGate Server

This appliance hails from a Swedish company that has been going since 1997. The software runs on a Sun Netra X1 box (1U in size). It also has the widest range of client types we saw in this test.

René Millman Sep 1 2003 12:00AM Security

Log In

  |  Forgot your password?